CN101043319A - Digital content protective system and method - Google Patents
Digital content protective system and method Download PDFInfo
- Publication number
- CN101043319A CN101043319A CNA2006100600148A CN200610060014A CN101043319A CN 101043319 A CN101043319 A CN 101043319A CN A2006100600148 A CNA2006100600148 A CN A2006100600148A CN 200610060014 A CN200610060014 A CN 200610060014A CN 101043319 A CN101043319 A CN 101043319A
- Authority
- CN
- China
- Prior art keywords
- document
- user
- plug
- digital content
- key pair
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A protecting system and method for the digital content, the method includes following steps: create file and encrypt the file; create the user's authority table of the file; when the user extract the encrypted file, find and judge the user's operation authority of the file; if the user has the operation authority, decrypt the file, and allow the user to the operation; record the user's operation. Using the invention it can encrypt the electrical file automatically, judge the user's operation authority to protect the confidential paper of business.
Description
[technical field]
The present invention relates to a kind of digital content protective system and method.
[background technology]
Along with Internet development, digitized equipment and digitized information are used in daily life widely.People can download digitized image (image), music (audio), picture (graph) and film (video) etc. from network at an easy rate, the user also can duplicate and revise these digitized information easily, even after altering these digitlization information, declare it is the works of oneself, carry out coml and use, seek illegitimate benefits.This behavior grievous injury the proprietary intellectual property of data.Because the prosperity of internet, digitized multimedia information is easy to be duplicated mala fide and propagate like this under the situation without copyright owner's mandate excessively.So digitized multimedia information must possess the measure that protects the intellectual property, and could protect copyright owner's legitimate rights and interests.
Digital content protection comprises two aspects: the one, and the digital content of propagating on the protecting network is not illegally distorted, and the 2nd, provide effective protection to digital content, prevent from arbitrarily to be propagated.At present, copyrighted digital content protection and management are mainly adopted based on industry Open Mobile Alliance digital copyright management (Open Mobile Alliance Digital Rights Management, OMA DRM) standard techniques scheme.OMA DRM has defined the various copyrights of digital content and has used controlling models, and making of control figure content is used for protecting digital content effectively.The architectural framework of this technical scheme mainly comprises: digital content provides the digital copyright management proxy (DRM Agent) of door, digital content delivery system, digital rights management service device and user terminal, and wherein the digital rights management service device comprises digital content packing server (Packager Server) and copyright Distributor (Rights Issuer Server).Wherein digital content provides door to be used to provide digital content and copyright regulation management; Digital content delivery system is used for distribution procedure and the reference numerals content sender and the digital content recipient of control figure content; Digital content packing server is used for digital content is encrypted, and is packaged into the DRM message bag of standard; The copyright Distributor is responsible for sending the rights certificate of digital content; Digital copyright management proxy then is used for the rights certificate of resolution digital content and the copyright control of combine digital content.
, application number open on January 26th, 2005 is 03178580.8 Chinese patent application case, disclosed a kind of copyrighted digital content protection and management method and system.This method be by digital content delivery system to copyrighted digital content protection and the request of management system submission copyright control, whether described digital content delivery system determines distribute digital content according to copyright control result.But this method can only the control figure content transmission, uncontrollable user is to the use of digital content.
[summary of the invention]
In view of above content, be necessary to provide a kind of digital content protective system, it can be encrypted electronic document automatically, differentiates active user's rights of using, with the classified papers of protection enterprises.
In view of above content, also be necessary to provide a kind of digital content protection method, it can be encrypted electronic document automatically, differentiates active user's rights of using, with the classified papers of protection enterprises.
A kind of digital content protective system comprises the server and client side who links to each other by the network communication engine.Described server comprises: the document content unit is used to a newly-built document creation user right tabulation; The certificate unit is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation.Described client comprises: identification module, be used to generate the encryption key pair of file encryption information header and document, and the document enciphered message head comprises the digital element identifier of a unique identification the document; Encrypting-decrypting module is used for according to this encryption key pair document being carried out encryption and decryption; Plug-in management module (Renderer ManagementModule, RM), be used for management and control identification module, encrypting-decrypting module and FTP client FTP plug-in unit, use credentials check user's authority according to the user, and judge whether this user has pair the document to carry out operation permission.
Described client also comprises: the local information notification module, and the information that is used between system plugin and the plug-in management module transmits; Network information notification module, the information that is used between plug-in management module and the network communication engine transmits.
A kind of digital content protection method comprises the steps: to create document and encrypts the document; Create the user right tabulation of the document; The user extracts this encrypted document, searches and judges that this user is to the document operation authority; If the user has operation authority, deciphering the document.
Described encrypted document may further comprise the steps: the file encryption information header and the encryption key pair that generate the document; Preserve the document enciphered message head and this encryption key pair; By this encryption key pair the document is encrypted, and added ciphertext retaining front at this and enclose the file encryption information header.
Described step is searched and is judged that this user may further comprise the steps the document operation authority: obtain the file encryption information header of the document, judge whether this user has the use certificate of the document; If do not have, then obtain the user right tabulation of the document according to the document enciphered message head; Generate the use certificate of this user according to this user right tabulation to the document; Judge this user's operation authority according to this use certificate.
Compared to prior art, described digital content protective system and method by electronic document being encrypted and being authorized, can be discerned user's authority automatically, have effectively prevented leaking of enterprises classified papers.Described digital content protective system and method can not need other permission system to login in conjunction with enterprise customer's account number, distinguish active user's identity automatically.
[description of drawings]
Fig. 1 is the system architecture diagram of digital content protective system preferred embodiment of the present invention.
Fig. 2 is the overall flow figure of digital content protection method preferred embodiment of the present invention.
Fig. 3 is the detail flowchart of the encrypted document step of digital content protection method of the present invention.
Fig. 4 is the detail flowchart of the searching user right step of digital content protection method of the present invention.
[embodiment]
As shown in Figure 1, be the system architecture diagram of digital content protective system preferred embodiment of the present invention.This system mainly comprises digital rights management service device 1, a plurality of digital copyright management clients 2 and network communication engine 3.
Described digital rights management service device 1 comprises document content unit 11, certificate unit 12 and log record/tracing unit 13.Wherein, document content unit 11 is used to a newly-built document to create user right in the user right tabulation and preserves these new document data, this user right list records the setting of different user to the document operating right, comprise reading, printing, modification etc., can find the rights of using of different user by this user right tabulation to the document, and can find the condition of use, comprise reading, printing, modification etc.; Certificate unit 12 is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation, this user's use certificate school bag contains the rights of using of this user to the document, uses certificate can judge that can this user operate document according to this user; Log record/tracing unit 13 is used to preserve the user to operation that the document carried out.
Described digital copyright management client 2 comprises identification module 21, network information notification module 22, encrypting-decrypting module 23, plug-in management module 24, local information notification module 25 and a plurality of system plugin.Described system plugin comprises Office plug-in unit 26, Pro/E plug-in unit 27, PDF plug-in unit 28, other plug-in unit 29.Plug-in unit is a kind of separate procedure in the computer software, and it can not be carried out separately, must depend on certain software, reaches the effect that strengthens original software function.Wherein, also have a RM buffer memory in the plug-in management module 24, this RM buffer memory has plug-in management module 24 often and recently to use the data of being.
Wherein, identification module 21 is used to generate file encryption information header and encryption key pair, obtains the file encryption information header from document.The document enciphered message head includes the DOI sign of document, DOI (the Digital Object Identifier that the document enciphered message head is comprised, the digital element identifier) ISBN (International Standard Book Number) of similar books (International StandardBook Number, ISBN).This digital element identifier is a unique value, can document of unique identification with it.Such as, three computer: M1 are arranged, M2, M3, M1 have a document C: D1.doc, the digital element identifier of supposing document D 1 is Id1, when document D 1.doc be copied to M2 C: D2.doc, copied to from M2 again then M3 C: D3.doc, original document D1.Doc has just had two copies like this, but D1.doc, D2.doc, D3.doc are same documents, if but be whether can't discern these three parts of documents be same document only from filename, at this moment just need use its digital element identifier, and the digital element identifier of these three parts of documents all is Id1, so just can judge that according to this digital element identifier these three parts of documents are same documents.
Encrypting-decrypting module 23 is used for according to encryption key pair document being carried out encryption and decryption.In ciphering process, plug-in management module 24 is used to obtain file encryption information header and the encryption key pair that needs encrypted document, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, the document enciphered message head is enclosed in the literary composition retaining front after encryption.
Described plug-in management module 24 also is used for when other users need visit an encrypted document, obtain the file encryption information header of this encrypted document, the document enciphered message hair is delivered to certificate unit 12, certificate unit 12 obtains the user right tabulation of this encrypted document according to the document enciphered message head, this user of inquiry is to the operating right of this encrypted document from the user right tabulation of this encrypted document, generate this user according to this user's operating right the use certificate of this encrypted document is returned to plug-in management module 24, plug-in management module 24 is according to this user's of use credentials check of this user authority, judge whether the user can operate encrypted document, and note the operation that this user carries out this encrypted document, record is sent to log record/tracing unit 13.
Described encrypting-decrypting module 23 also is used for when judging that described user has when this encrypted document carried out operation permission, is decrypted this encrypted document.Idiographic flow is as follows: plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, is decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realizes the deciphering of document.
The information that network information notification module 22 is used between plug-in management module 24 and the network communication engine 3 transmits.The information that local information notification module 25 is used between said system plug-in unit and the plug-in management module 24 transmits.
Described network communication engine 3 is a kind of intermediate equipment of network communication, by this intermediate equipment, can realize the information interchange between digital rights management service device 1 and the digital copyright management client 2.Connection between described digital rights management service device 1 and the digital copyright management client 2 also can realize by network.
As described below, be by aforementioned digital content protective system, implement the step of this digital content protection.After what a new document was document creator create, and selects to encrypt the document, identification module 21 generated the file encryption information header and the encryption key pair of the document, and the document enciphered message head comprises a digital element identifier.In the present embodiment, ciphering process carries out in client.
Then, plug-in management module 24 is obtained the document enciphered message head and this encryption key pair, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, enclose the document enciphered message head in this encrypted document front, in the user right tabulation, create user right for the document by document content unit 11 then.
After the another one user extracts and opens this encrypted document with this encrypted document, system plugin is by local information notification module 25 notice plug-in management modules 24, whether inquiry plug-in management module 24 allows this user to carry out this operation, if the file encryption information header of this encrypted document has been arranged in the RM buffer memory, then plug-in management module 24 will directly be obtained the file encryption information header of this encrypted document from the RM buffer memory.If the file encryption information header of this encrypted document not in the RM buffer memory, then plug-in management module 24 is obtained the file encryption information header by identification module 21 from this encrypted document.Then, plug-in management module 24 confirms whether to have in the RM buffer memory use certificate of the corresponding the document of this user again, if the use certificate of the corresponding the document of this user has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this use certificate from the RM buffer memory.If the use certificate of the corresponding the document of this user not in the RM buffer memory, plug-in management module 24 is sent to certificate unit 12 by network information notification module 22 with the document enciphered message head again, certificate unit 12 obtains the user right tabulation of the document from document content unit 11 according to the document enciphered message head, tabulation generates this user the use certificate of the document is returned to plug-in management module 24 according to this user right again, plug-in management module 24 judges according to this user's of use credentials check of this user operating right whether this user's operation is allowed to.If this user does not have operation authority, plug-in management module 24 notice Office plug-in units 26 stop this user's operation this time.If this user has operation authority, plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, be decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realize the deciphering of document, allow this user to carry out operation this time.Simultaneously, plug-in management module 24 is got off this user's operation note this time, and record is sent to log record/tracing unit 13.
As shown in Figure 2, be the overall flow figure of digital content protection method preferred embodiment of the present invention.At first, the user starts documents editing program (as Microsoft Office), and Office plug-in unit 26 will be taken over all operations of document editor, and the user creates a new document (step S300).The user selects the document is saved as ciphertext then, Office plug-in unit 26 notice plug-in management modules 24 are encrypted the document, at this moment, identification module 21 generates the file encryption information header and the encryption key pair of the document, the document enciphered message head comprises a digital element identifier, plug-in management module 24 is obtained the document enciphered message head and this encryption key pair, the document enciphered message head and this encryption key pair are sent to 11 preservations of document content unit, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged then, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, enclose under the document enciphered message head and the preservation in the retaining of the literary composition after encryption front, create the user right tabulation (step S301) of the document then by document content unit 11.
When the another one user extracts and open this encrypted document when reading (step S302) with this encrypted document, Office plug-in unit 26 these users of interception are to the operation of this encrypted document, whether inquiry plug-in management module 24 allows this user to carry out this operation, and plug-in management module 24 is obtained the document enciphered message head.Then, plug-in management module 24 is obtained the use certificate (step S303) of the corresponding the document of user again.Plug-in management module 24 judges that according to this user's of use credentials check of this user rights of using this user has or not operation authority (step S304).If this user does not have operation authority, plug-in management module 24 notice Office plug-in units 26 stop this user's operation (step S305) this time, if this user has operation authority, plug-in management module 24 confirms in the RM buffer memory whether this encryption key pair has been arranged, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, be decrypted computing by 23 pairs of these encrypted document of encrypting-decrypting module and this encryption key pair, realize the deciphering of document, allow this user to carry out operation (step S306) this time.Simultaneously, plug-in management module 24 is noted this user's operation this time, and record is sent to log record/tracing unit 13 (step S307).When carrying out other operation, this user (comprises all operations that documents editing/browser provides, such as Microsoft Word " saving as " operation), the operation note that can this user be carried out by identical flow process and by plug-in management module 24 is in log record/tracing unit 13.
As shown in Figure 3, be the detail flowchart of the encrypted document step of digital content protection method of the present invention.After user's selection is ciphertext with document storing, identification module 21 generates the file encryption information header and the encryption key pair of the document, Office plug-in unit 26 notice plug-in management modules 24 are encrypted (step S400) with the document, and plug-in management module 24 obtains the document enciphered message head and encryption key pair (step S401) by identification module 21.Plug-in management module 24 sends to 11 preservations (step S402) of document content unit with the document enciphered message head and this encryption key pair, judge whether the document enciphered message head and encryption key pair preserve success (step S403), if do not preserve successfully, then finish this operation.If preserve successfully, then plug-in management module 24 confirms whether this encryption key pair has been arranged in the RM buffer memory, if this encryption key pair has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this encryption key pair from the RM buffer memory.If this encryption key pair not in the RM buffer memory, then plug-in management module 24 is taken out this encryption key pair from document content unit 11, carry out cryptographic calculation by 23 pairs of the document of encrypting-decrypting module and this encryption key pair, realize the encryption of document, and enclose the document enciphered message head (step S404) in this encrypted document front.
As shown in Figure 4, be the detail flowchart of the searching user right step of digital content protection method of the present invention.When other users extract this encrypted document when reading, at this moment Office plug-in unit 26 will be tackled the operation of this user to this encrypted document, and by local information notification module 25 notice plug-in management modules 24, whether inquiry plug-in management module 24 allows this user to carry out this operation (step S500).Plug-in management module 24 confirms whether to have had in the RM buffer memory file encryption information header (step S501) of this encrypted document, if the file encryption information header of this encrypted document has been arranged in the RM buffer memory, then plug-in management module 24 will directly be obtained the file encryption information header (step S502) of this encrypted document from the RM buffer memory.If the file encryption information header of this encrypted document not in the RM buffer memory, then plug-in management module 24 is obtained file encryption information header (step S503) by identification module 21 from this encrypted document.
Then, plug-in management module 24 confirms whether to have in the RM buffer memory use certificate (step S504) of the corresponding the document of this user again, if the use certificate of the corresponding the document of this user has been arranged in the RM buffer memory, then plug-in management module 24 is directly obtained this use certificate (step S505) from the RM buffer memory.If the use certificate of the corresponding the document of this user not in the RM buffer memory, then plug-in management module 24 is given the network communication engine 3 by the file encryption information header that network information notification module 22 transmits the document, the network communication engine 3 sends the document enciphered message head to certificate unit 12 again, certificate unit 12 obtains this encrypted document according to the document enciphered message head from document content unit 11 user right tabulation, the use certificate that generates the corresponding the document of this user according to this user right tabulation returns to plug-in management module 24 (step S506) again.Plug-in management module 24 judges again according to this user's of use credentials check of this user operating right whether this user's operation this time is allowed to (step S507).
Claims (11)
1. digital content protective system comprises server, client and connects described server and client side's network communication engine, it is characterized in that described server comprises:
The document content unit is used to a newly-built document creation user right tabulation;
The certificate unit is used for generating the use certificate of different user to the document according to above-mentioned user right tabulation;
Described client comprises:
Identification module is used to generate the encryption key pair of file encryption information header and document, and the document enciphered message head comprises the digital element identifier of a unique identification the document;
Encrypting-decrypting module is used for according to this encryption key pair document being carried out encryption and decryption;
The plug-in management module is used for management and control identification module, encrypting-decrypting module and FTP client FTP plug-in unit, uses credentials check user's authority according to the user, and judges whether this user has pair the document to carry out operation permission.
2. digital content protective system as claimed in claim 1 is characterized in that, described plug-in management module is to transmit and the FTP client FTP plug-in unit is managed and controls by a local information notification module and the FTP client FTP plug-in unit information of carrying out.
3. digital content protective system as claimed in claim 1 is characterized in that, described plug-in management module is to transmit by a network information notification module and the network communication engine information of carrying out.
4. digital content protective system as claimed in claim 1 is characterized in that, when described plug-in management module judged that this user has the operating right of pair the document, the control encrypting-decrypting module utilized encryption key pair that encrypted document is decrypted.
5. digital content protective system as claimed in claim 1 is characterized in that, described server also comprises:
Log record/tracing unit is used to preserve the user to operation that document carried out.
6. digital content protective system as claimed in claim 5 is characterized in that, described plug-in management module also is used for:
Note the user to the operation that document carried out, and record is sent to log record/tracing unit preservation of server.
7. a digital content protection method is characterized in that, this method comprises the steps:
Create document and encrypt the document;
Create the user right tabulation of the document;
When the user extracts this encrypted document, search and judge that this user is to the document operation authority;
If the user has operation authority, deciphering the document.
8. digital content protection method as claimed in claim 7 is characterized in that described method also comprises the steps:
Note this user's associative operation.
9. digital content protection method as claimed in claim 7 is characterized in that, described encrypted document may further comprise the steps:
Generate the file encryption information header and the encryption key pair of the document;
Preserve the document enciphered message head and this encryption key pair;
By this encryption key pair the document is encrypted, and added ciphertext retaining front at this and enclose the file encryption information header.
10. digital content protection method as claimed in claim 7 is characterized in that, described step is searched and judged that this user comprises the document operation authority:
Obtain the file encryption information header of the document, judge whether this user has the use certificate of the document;
If do not have, then obtain the user right tabulation of the document according to the document enciphered message head;
Generate the use certificate of this user according to this user right tabulation to the document;
Judge this user's operation authority according to this use certificate.
11. digital content protection method as claimed in claim 7 is characterized in that, this method also comprises the steps:
If this user does not have operation authority, then stop this user's operation this time.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100600148A CN101043319B (en) | 2006-03-22 | 2006-03-22 | Digital content protective system and method |
US11/565,650 US20070226488A1 (en) | 2006-03-22 | 2006-12-01 | System and method for protecting digital files |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006100600148A CN101043319B (en) | 2006-03-22 | 2006-03-22 | Digital content protective system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101043319A true CN101043319A (en) | 2007-09-26 |
CN101043319B CN101043319B (en) | 2011-02-02 |
Family
ID=38566943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006100600148A Expired - Fee Related CN101043319B (en) | 2006-03-22 | 2006-03-22 | Digital content protective system and method |
Country Status (2)
Country | Link |
---|---|
US (1) | US20070226488A1 (en) |
CN (1) | CN101043319B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677352A (en) * | 2008-09-19 | 2010-03-24 | 富士施乐株式会社 | Document management system, document producing apparatus, document use managing apparatus, and computer readable medium |
CN101957895A (en) * | 2009-07-17 | 2011-01-26 | 精品科技股份有限公司 | External rights control management system of electronic record and method thereof |
CN101960460A (en) * | 2008-02-27 | 2011-01-26 | 微软公司 | Secure file transmission and reputation are searched |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
CN102457503A (en) * | 2010-10-29 | 2012-05-16 | 镇江雅迅软件有限责任公司 | Secret key control device based on file authority management |
CN102474530A (en) * | 2009-08-19 | 2012-05-23 | 宝马股份公司 | Method for configuring infotainment applications in motor vehicle |
CN101741889B (en) * | 2008-11-17 | 2012-07-11 | 北京易路联动技术有限公司 | Method, system and service for centralized management of network services |
CN101957893B (en) * | 2009-07-15 | 2013-02-20 | 精品科技股份有限公司 | File permission management system |
CN105373961A (en) * | 2015-10-30 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | Image modification method and device, and image management system |
CN105790962A (en) * | 2014-12-24 | 2016-07-20 | 华为技术有限公司 | Conference document obtaining method, apparatus, and system |
CN106453425A (en) * | 2016-12-09 | 2017-02-22 | 郑州云海信息技术有限公司 | Multiuser right management method and multiuser right management system for using host plugin |
CN106503581A (en) * | 2016-10-21 | 2017-03-15 | 珠海市魅族科技有限公司 | A kind of documents editing processing method and processing device |
CN106991035A (en) * | 2017-04-06 | 2017-07-28 | 北京计算机技术及应用研究所 | A kind of Host Supervision System based on micro services framework |
CN111625854A (en) * | 2020-05-25 | 2020-09-04 | 聚好看科技股份有限公司 | Document encryption method, access method, server and system |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8274401B2 (en) * | 2006-12-22 | 2012-09-25 | Acterna Llc | Secure data transfer in a communication system including portable meters |
US20100217988A1 (en) * | 2007-04-12 | 2010-08-26 | Avow Systems, Inc. | Electronic document management and delivery |
US7900248B2 (en) * | 2007-05-31 | 2011-03-01 | Microsoft Corporation | Access control negation using negative groups |
US20080307486A1 (en) * | 2007-06-11 | 2008-12-11 | Microsoft Corporation | Entity based access management |
US8468579B2 (en) | 2007-06-15 | 2013-06-18 | Microsoft Corporation | Transformation of sequential access control lists utilizing certificates |
US8516602B2 (en) * | 2008-04-25 | 2013-08-20 | Nokia Corporation | Methods, apparatuses, and computer program products for providing distributed access rights management using access rights filters |
US8515996B2 (en) | 2008-05-19 | 2013-08-20 | Emulex Design & Manufacturing Corporation | Secure configuration of authentication servers |
US9081888B2 (en) | 2010-03-31 | 2015-07-14 | Cloudera, Inc. | Collecting and aggregating log data with fault tolerance |
US9082127B2 (en) | 2010-03-31 | 2015-07-14 | Cloudera, Inc. | Collecting and aggregating datasets for analysis |
US9317572B2 (en) | 2010-03-31 | 2016-04-19 | Cloudera, Inc. | Configuring a system to collect and aggregate datasets |
US8874526B2 (en) | 2010-03-31 | 2014-10-28 | Cloudera, Inc. | Dynamically processing an event using an extensible data model |
US8788815B1 (en) * | 2011-01-31 | 2014-07-22 | Gazzang, Inc. | System and method for controlling access to decrypted data |
US8880592B2 (en) | 2011-03-31 | 2014-11-04 | Cloudera, Inc. | User interface implementation for partial display update |
US9128949B2 (en) | 2012-01-18 | 2015-09-08 | Cloudera, Inc. | Memory allocation buffer for reduction of heap fragmentation |
US9172608B2 (en) | 2012-02-07 | 2015-10-27 | Cloudera, Inc. | Centralized configuration and monitoring of a distributed computing cluster |
US9405692B2 (en) | 2012-03-21 | 2016-08-02 | Cloudera, Inc. | Data processing performance enhancement in a distributed file system |
US9338008B1 (en) | 2012-04-02 | 2016-05-10 | Cloudera, Inc. | System and method for secure release of secret information over a network |
US9842126B2 (en) | 2012-04-20 | 2017-12-12 | Cloudera, Inc. | Automatic repair of corrupt HBases |
US9753954B2 (en) | 2012-09-14 | 2017-09-05 | Cloudera, Inc. | Data node fencing in a distributed file system |
US9342557B2 (en) | 2013-03-13 | 2016-05-17 | Cloudera, Inc. | Low latency query engine for Apache Hadoop |
CN104079532A (en) * | 2013-03-26 | 2014-10-01 | 腾讯科技(深圳)有限公司 | Online reading method and system, client and server |
US9477731B2 (en) | 2013-10-01 | 2016-10-25 | Cloudera, Inc. | Background format optimization for enhanced SQL-like queries in Hadoop |
US9934382B2 (en) | 2013-10-28 | 2018-04-03 | Cloudera, Inc. | Virtual machine image encryption |
US9690671B2 (en) | 2013-11-01 | 2017-06-27 | Cloudera, Inc. | Manifest-based snapshots in distributed computing environments |
US10171635B2 (en) | 2013-12-04 | 2019-01-01 | Cloudera, Inc. | Ensuring properly ordered events in a distributed computing environment |
US9229674B2 (en) | 2014-01-31 | 2016-01-05 | Ebay Inc. | 3D printing: marketplace with federated access to printers |
CN105320893B (en) * | 2014-07-30 | 2018-09-28 | 上海斐讯数据通信技术有限公司 | A kind of data prevention method and system applied to mobile terminal |
US9747333B2 (en) | 2014-10-08 | 2017-08-29 | Cloudera, Inc. | Querying operating system state on multiple machines declaratively |
US9595037B2 (en) | 2014-12-16 | 2017-03-14 | Ebay Inc. | Digital rights and integrity management in three-dimensional (3D) printing |
US20160167307A1 (en) * | 2014-12-16 | 2016-06-16 | Ebay Inc. | Systems and methods for 3d digital printing |
US9442808B1 (en) * | 2014-12-30 | 2016-09-13 | Emc Corporation | Session tickets for a backup and recovery system |
US10120904B2 (en) | 2014-12-31 | 2018-11-06 | Cloudera, Inc. | Resource management in a distributed computing environment |
US10068074B2 (en) | 2016-03-25 | 2018-09-04 | Credly, Inc. | Generation, management, and tracking of digital credentials |
US10033536B2 (en) | 2016-03-25 | 2018-07-24 | Credly, Inc. | Generation, management, and tracking of digital credentials |
US20190089692A1 (en) | 2017-09-15 | 2019-03-21 | Pearson Education, Inc. | Time-based degradation of digital credentials in a digital credential platform |
US10803104B2 (en) | 2017-11-01 | 2020-10-13 | Pearson Education, Inc. | Digital credential field mapping |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7437550B2 (en) * | 1999-12-02 | 2008-10-14 | Ponoi Corp. | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data |
US7178021B1 (en) * | 2000-03-02 | 2007-02-13 | Sun Microsystems, Inc. | Method and apparatus for using non-secure file servers for secure information storage |
US7036011B2 (en) * | 2000-06-29 | 2006-04-25 | Cachestream Corporation | Digital rights management |
JP2003304243A (en) * | 2002-04-12 | 2003-10-24 | Mitsubishi Electric Information Systems Corp | Electronic signature program |
CN1485746A (en) * | 2002-09-27 | 2004-03-31 | 鸿富锦精密工业(深圳)有限公司 | Management system and method for user safety authority limit |
WO2005036882A1 (en) * | 2003-10-14 | 2005-04-21 | Matsushita Electric Industrial Co., Ltd. | Mpeg-21 digital content protection system |
WO2005048056A2 (en) * | 2003-11-06 | 2005-05-26 | Live Cargo, Inc. | Systems and methods for electronic information distribution |
JP4081048B2 (en) * | 2004-06-18 | 2008-04-23 | 株式会社東芝 | Content protection method, apparatus and program |
CN100361443C (en) * | 2004-08-17 | 2008-01-09 | 迈普(四川)通信技术有限公司 | Access control method and safety proxy server |
US20060294366A1 (en) * | 2005-06-23 | 2006-12-28 | International Business Machines Corp. | Method and system for establishing a secure connection based on an attribute certificate having user credentials |
-
2006
- 2006-03-22 CN CN2006100600148A patent/CN101043319B/en not_active Expired - Fee Related
- 2006-12-01 US US11/565,650 patent/US20070226488A1/en not_active Abandoned
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101960460A (en) * | 2008-02-27 | 2011-01-26 | 微软公司 | Secure file transmission and reputation are searched |
CN101677352B (en) * | 2008-09-19 | 2014-04-02 | 富士施乐株式会社 | Document management system, document producing apparatus, document use managing apparatus, and computer readable medium |
CN101677352A (en) * | 2008-09-19 | 2010-03-24 | 富士施乐株式会社 | Document management system, document producing apparatus, document use managing apparatus, and computer readable medium |
CN101741889B (en) * | 2008-11-17 | 2012-07-11 | 北京易路联动技术有限公司 | Method, system and service for centralized management of network services |
CN101957893B (en) * | 2009-07-15 | 2013-02-20 | 精品科技股份有限公司 | File permission management system |
CN101957895A (en) * | 2009-07-17 | 2011-01-26 | 精品科技股份有限公司 | External rights control management system of electronic record and method thereof |
CN102474530A (en) * | 2009-08-19 | 2012-05-23 | 宝马股份公司 | Method for configuring infotainment applications in motor vehicle |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
CN102457503A (en) * | 2010-10-29 | 2012-05-16 | 镇江雅迅软件有限责任公司 | Secret key control device based on file authority management |
CN105790962A (en) * | 2014-12-24 | 2016-07-20 | 华为技术有限公司 | Conference document obtaining method, apparatus, and system |
CN105790962B (en) * | 2014-12-24 | 2020-02-14 | 华为技术有限公司 | Method, device and system for acquiring conference document |
CN105373961A (en) * | 2015-10-30 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | Image modification method and device, and image management system |
CN106503581A (en) * | 2016-10-21 | 2017-03-15 | 珠海市魅族科技有限公司 | A kind of documents editing processing method and processing device |
CN106453425A (en) * | 2016-12-09 | 2017-02-22 | 郑州云海信息技术有限公司 | Multiuser right management method and multiuser right management system for using host plugin |
CN106991035A (en) * | 2017-04-06 | 2017-07-28 | 北京计算机技术及应用研究所 | A kind of Host Supervision System based on micro services framework |
CN111625854A (en) * | 2020-05-25 | 2020-09-04 | 聚好看科技股份有限公司 | Document encryption method, access method, server and system |
CN111625854B (en) * | 2020-05-25 | 2022-10-14 | 聚好看科技股份有限公司 | Document encryption method, access method, server and system |
Also Published As
Publication number | Publication date |
---|---|
US20070226488A1 (en) | 2007-09-27 |
CN101043319B (en) | 2011-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101043319B (en) | Digital content protective system and method | |
US8458273B2 (en) | Content rights management for document contents and systems, structures, and methods therefor | |
US8595488B2 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
US7512798B2 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
Liu et al. | Digital rights management for content distribution | |
US8909924B2 (en) | Digital asset management system | |
US7392547B2 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
EP1686504B1 (en) | Flexible licensing architecture in content rights management systems | |
US20040039932A1 (en) | Apparatus, system and method for securing digital documents in a digital appliance | |
US7549062B2 (en) | Organization-based content rights management and systems, structures, and methods therefor | |
US20110185179A1 (en) | System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component | |
US20030051172A1 (en) | Method and system for protecting digital objects distributed over a network | |
KR20040002771A (en) | Systems and methods for providing secure server key operations | |
US8972747B2 (en) | Managing information in a document serialization | |
Foltz et al. | Simplified key management for digital access control of information objects | |
Conrado et al. | Controlled sharing of personal content using digital rights management | |
Simpson et al. | Electronic Record Key Management for Digital Rights Management | |
Taft et al. | The application/pdf media type | |
Arsenova | Technical aspects of digital rights management | |
CN111385097A (en) | Method and storage medium for data signature authentication | |
Jonker et al. | Core security requirements of DRM systems | |
Chen et al. | An Approach of Digital Rights Management for E-Museum with Enforce Context Constraints in RBAC Environments | |
Wang et al. | Notice of Retraction: Research on digital content copyright protection system | |
CN111639305A (en) | Block chain-based content copyright protection method and system | |
JP2003196159A (en) | Information delivery method and device for preventing illicit use of information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110202 Termination date: 20150322 |
|
EXPY | Termination of patent right or utility model |